Cloud Security Architecture Based on User Authentication and Symmetric Key Cryptographic Techniques

被引:0
|
作者
Wani, Abdul Raoof [1 ]
Rana, Q. P. [2 ]
Pandey, Nitin [1 ]
机构
[1] Amity Univ Noida, Noida, Uttar Pradesh, India
[2] Jamia Hamdard, New Delhi, India
关键词
AES; SHA3; Blowfish; Cloud Security Architecture; Cloud computing;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing environment gives people to share resources, services and information. This environment is adopted by large number of organizations, so the rapid transition towards the cloud has fuelled concerns on security perspective. Encryption algorithms play main role in solving such kind of problems in the cloud computing environment. This paper proposes the structure for cloud security with efficient security in communication system and AES based file encryption system. This security architecture can be easily applied on PaaS, IaaS and SaaS and one time password provides extra security in the authenticating users. This paper presents the security of whole cloud computing environment.
引用
下载
收藏
页码:529 / 534
页数:6
相关论文
共 50 条
  • [41] A Chaotic Map-Based Authentication and Key Agreement Scheme with User Anonymity for Cloud Computing
    Wu, Fan
    Xu, Lili
    CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 189 - 200
  • [42] Provably secure biometric-based user authentication and key agreement scheme in cloud computing
    Wazid, Mohammad
    Das, Ashok Kumar
    Kumari, Saru
    Li, Xiong
    Wu, Fan
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4103 - 4119
  • [43] User-Friendly and Secure Architecture (UFSA) for Authentication of Cloud Services
    Fathi, Reza
    Salehi, Mohsen Amini
    Leiss, Ernst L.
    2015 IEEE 8TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, 2015, : 516 - 523
  • [44] RASS - A Concurrency Based Bitwise Symmetric Key Cryptographic Algorithm
    Roy, Abhriya
    Ray, Ronit
    De, Saptarshi
    Guha, Shalini
    Goswami, Sukalyan
    Basak, Ratan Kumar
    Mukhopadhyay, Bipasha
    Chatterjee, Souvik
    Zaman, Amrin
    Nag, Sucheta
    2016 IEEE 7TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS MOBILE COMMUNICATION CONFERENCE (UEMCON), 2016,
  • [45] Strengthening Cloud Security: An Innovative Multi-Factor Multi-Layer Authentication Framework for Cloud User Authentication
    Mostafa, Ayman Mohamed
    Ezz, Mohamed
    Elbashir, Murtada K.
    Alruily, Meshrif
    Hamouda, Eslam
    Alsarhani, Mohamed
    Said, Wael
    APPLIED SCIENCES-BASEL, 2023, 13 (19):
  • [46] Security Enhancement of an Improved Remote User Authentication Scheme with Key Agreement
    Kaul, Sonam Devgan
    Awasthi, Amit K.
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 89 (02) : 621 - 637
  • [47] Security Enhancement of an Improved Remote User Authentication Scheme with Key Agreement
    Sonam Devgan Kaul
    Amit K. Awasthi
    Wireless Personal Communications, 2016, 89 : 621 - 637
  • [48] BDNA-A DNA inspired symmetric key cryptographic technique to secure cloud computing
    Sohal, Manreet
    Sharma, Sandeep
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (01) : 1417 - 1425
  • [49] Enhancing security and efficiency in cloud computing authentication and key agreement scheme based on smart card
    Mariem Bouchaala
    Cherif Ghazel
    Leila Azouz Saidane
    The Journal of Supercomputing, 2022, 78 : 497 - 522
  • [50] Enhancing security and efficiency in cloud computing authentication and key agreement scheme based on smart card
    Bouchaala, Mariem
    Ghazel, Cherif
    Saidane, Leila Azouz
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (01): : 497 - 522